[go: nahoru, domu]

blob: 74db1ef4302fdf61d5b15d96c8829e5581afdf61 [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/extensions/installed_loader.h"
#include <stddef.h>
#include <memory>
#include <string>
#include <vector>
#include "base/files/file_path.h"
#include "base/metrics/histogram_functions.h"
#include "base/metrics/histogram_macros.h"
#include "base/strings/utf_string_conversions.h"
#include "base/threading/thread_restrictions.h"
#include "base/time/time.h"
#include "base/trace_event/trace_event.h"
#include "base/values.h"
#include "build/chromeos_buildflags.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/extensions/corrupted_extension_reinstaller.h"
#include "chrome/browser/extensions/extension_management.h"
#include "chrome/browser/extensions/extension_service.h"
#include "chrome/browser/extensions/extension_util.h"
#include "chrome/browser/extensions/load_error_reporter.h"
#include "chrome/browser/extensions/profile_util.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/extensions/chrome_manifest_url_handlers.h"
#include "chrome/common/extensions/manifest_handlers/settings_overrides_handler.h"
#include "chrome/common/webui_url_constants.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/common/url_constants.h"
#include "extensions/browser/allowlist_state.h"
#include "extensions/browser/event_router.h"
#include "extensions/browser/extension_prefs.h"
#include "extensions/browser/extension_registry.h"
#include "extensions/browser/extension_system.h"
#include "extensions/browser/extension_util.h"
#include "extensions/browser/management_policy.h"
#include "extensions/browser/permissions_manager.h"
#include "extensions/browser/pref_types.h"
#include "extensions/browser/ui_util.h"
#include "extensions/common/extension.h"
#include "extensions/common/extension_l10n_util.h"
#include "extensions/common/extension_set.h"
#include "extensions/common/extension_urls.h"
#include "extensions/common/file_util.h"
#include "extensions/common/manifest.h"
#include "extensions/common/manifest_constants.h"
#include "extensions/common/manifest_handlers/background_info.h"
#include "extensions/common/permissions/api_permission.h"
#include "extensions/common/permissions/permissions_data.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
#if BUILDFLAG(IS_CHROMEOS_ASH)
#include "chrome/browser/ash/profiles/profile_helper.h"
#include "components/user_manager/user.h"
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
using content::BrowserThread;
namespace extensions {
namespace {
// The following enumeration is used in histograms matching
// Extensions.ManifestReload*.
enum ManifestReloadReason {
NOT_NEEDED = 0, // Reload not needed.
UNPACKED_DIR, // Unpacked directory.
NEEDS_RELOCALIZATION, // The locale has changed since we read this extension.
CORRUPT_PREFERENCES, // The manifest in the preferences is corrupt.
// New enum values must go above here.
NUM_MANIFEST_RELOAD_REASONS
};
// Used in histogram Extensions.BackgroundPageType.
enum BackgroundPageType {
NO_BACKGROUND_PAGE = 0,
BACKGROUND_PAGE_PERSISTENT,
EVENT_PAGE,
SERVICE_WORKER,
// New enum values must go above here.
NUM_BACKGROUND_PAGE_TYPES
};
// Used in histogram Extensions.ExternalItemState.
enum ExternalItemState {
DEPRECATED_EXTERNAL_ITEM_DISABLED = 0,
DEPRECATED_EXTERNAL_ITEM_ENABLED,
EXTERNAL_ITEM_WEBSTORE_DISABLED,
EXTERNAL_ITEM_WEBSTORE_ENABLED,
EXTERNAL_ITEM_NONWEBSTORE_DISABLED,
EXTERNAL_ITEM_NONWEBSTORE_ENABLED,
EXTERNAL_ITEM_WEBSTORE_UNINSTALLED,
EXTERNAL_ITEM_NONWEBSTORE_UNINSTALLED,
// New enum values must go above here.
EXTERNAL_ITEM_MAX_ITEMS
};
bool IsManifestCorrupt(const base::Value::Dict& manifest) {
// Because of bug #272524 sometimes manifests got mangled in the preferences
// file, one particularly bad case resulting in having both a background page
// and background scripts values. In those situations we want to reload the
// manifest from the extension to fix this.
return manifest.contains(manifest_keys::kBackgroundPage) &&
manifest.contains(manifest_keys::kBackgroundScripts);
}
ManifestReloadReason ShouldReloadExtensionManifest(const ExtensionInfo& info) {
// Always reload manifests of unpacked extensions, because they can change
// on disk independent of the manifest in our prefs.
if (Manifest::IsUnpackedLocation(info.extension_location))
return UNPACKED_DIR;
if (!info.extension_manifest)
return NOT_NEEDED;
// Reload the manifest if it needs to be relocalized.
if (extension_l10n_util::ShouldRelocalizeManifest(*info.extension_manifest))
return NEEDS_RELOCALIZATION;
// Reload if the copy of the manifest in the preferences is corrupt.
if (IsManifestCorrupt(*info.extension_manifest))
return CORRUPT_PREFERENCES;
return NOT_NEEDED;
}
BackgroundPageType GetBackgroundPageType(const Extension* extension) {
if (!BackgroundInfo::HasBackgroundPage(extension))
return NO_BACKGROUND_PAGE;
if (BackgroundInfo::HasPersistentBackgroundPage(extension))
return BACKGROUND_PAGE_PERSISTENT;
if (BackgroundInfo::IsServiceWorkerBased(extension))
return SERVICE_WORKER;
return EVENT_PAGE;
}
// Helper to record a single disable reason histogram value (see
// RecordDisableReasons below).
void RecordDisbleReasonHistogram(int reason) {
base::UmaHistogramSparse("Extensions.DisableReason2", reason);
}
// Records the disable reasons for a single extension grouped by
// disable_reason::DisableReason.
void RecordDisableReasons(int reasons) {
// |reasons| is a bitmask with values from ExtensionDisabledReason
// which are increasing powers of 2.
if (reasons == disable_reason::DISABLE_NONE) {
RecordDisbleReasonHistogram(disable_reason::DISABLE_NONE);
return;
}
for (int reason = 1; reason < disable_reason::DISABLE_REASON_LAST;
reason <<= 1) {
if (reasons & reason)
RecordDisbleReasonHistogram(reason);
}
}
// Returns the current access level for the given `extension`.
HostPermissionsAccess GetHostPermissionAccessLevelForExtension(
const Extension& extension) {
if (!util::CanWithholdPermissionsFromExtension(extension))
return HostPermissionsAccess::kCannotAffect;
bool has_active_hosts = !extension.permissions_data()
->active_permissions()
.effective_hosts()
.is_empty();
size_t active_hosts_size = extension.permissions_data()
->active_permissions()
.effective_hosts()
.size();
bool has_withheld_hosts = !extension.permissions_data()
->withheld_permissions()
.effective_hosts()
.is_empty();
if (!has_active_hosts && !has_withheld_hosts) {
// No hosts are granted or withheld, so none were requested.
// Check if the extension is using activeTab.
return extension.permissions_data()->HasAPIPermission(
mojom::APIPermissionID::kActiveTab)
? HostPermissionsAccess::kOnActiveTabOnly
: HostPermissionsAccess::kNotRequested;
}
if (!has_withheld_hosts) {
// No hosts were withheld; the extension is running all requested sites.
return HostPermissionsAccess::kOnAllRequestedSites;
}
// The extension is running automatically on some of the requested sites.
// <all_urls> (strangely) includes the chrome://favicon/ permission. Thus,
// we avoid counting the favicon pattern in the active hosts.
if (active_hosts_size > 1) {
return HostPermissionsAccess::kOnSpecificSites;
}
if (active_hosts_size == 1) {
const URLPattern& single_pattern = *extension.permissions_data()
->active_permissions()
.effective_hosts()
.begin();
if (single_pattern.scheme() != content::kChromeUIScheme ||
single_pattern.host() != chrome::kChromeUIFaviconHost)
return HostPermissionsAccess::kOnSpecificSites;
}
// The extension is not running automatically anywhere. All its hosts were
// withheld.
return HostPermissionsAccess::kOnClick;
}
void LogHostPermissionsAccess(const Extension& extension,
bool should_record_incremented_metrics) {
HostPermissionsAccess access_level =
GetHostPermissionAccessLevelForExtension(extension);
// Extensions.HostPermissions.GrantedAccess is emitted for every
// extension.
base::UmaHistogramEnumeration("Extensions.HostPermissions.GrantedAccess",
access_level);
if (should_record_incremented_metrics) {
base::UmaHistogramEnumeration("Extensions.HostPermissions.GrantedAccess2",
access_level);
}
const PermissionSet& active_permissions =
extension.permissions_data()->active_permissions();
const PermissionSet& withheld_permissions =
extension.permissions_data()->withheld_permissions();
// Since we only care about host permissions here, we don't want to
// look at API permissions that might cause Chrome to warn about all hosts
// (like debugger or devtools).
static constexpr bool kIncludeApiPermissions = false;
if (active_permissions.ShouldWarnAllHosts(kIncludeApiPermissions) ||
withheld_permissions.ShouldWarnAllHosts(kIncludeApiPermissions)) {
// Extension requests access to at least one eTLD.
base::UmaHistogramEnumeration(
"Extensions.HostPermissions.GrantedAccessForBroadRequests",
access_level);
if (should_record_incremented_metrics) {
base::UmaHistogramEnumeration(
"Extensions.HostPermissions.GrantedAccessForBroadRequests2",
access_level);
}
} else if (!active_permissions.effective_hosts().is_empty() ||
!withheld_permissions.effective_hosts().is_empty()) {
// Extension requests access to hosts, but not eTLD.
base::UmaHistogramEnumeration(
"Extensions.HostPermissions.GrantedAccessForTargetedRequests",
access_level);
if (should_record_incremented_metrics) {
base::UmaHistogramEnumeration(
"Extensions.HostPermissions.GrantedAccessForTargetedRequests2",
access_level);
}
}
}
} // namespace
InstalledLoader::InstalledLoader(ExtensionService* extension_service)
: extension_service_(extension_service),
extension_registry_(ExtensionRegistry::Get(extension_service->profile())),
extension_prefs_(ExtensionPrefs::Get(extension_service->profile())) {}
InstalledLoader::~InstalledLoader() {
}
void InstalledLoader::Load(const ExtensionInfo& info, bool write_to_prefs) {
// TODO(asargent): add a test to confirm that we can't load extensions if
// their ID in preferences does not match the extension's actual ID.
if (invalid_extensions_.find(info.extension_path) !=
invalid_extensions_.end())
return;
std::string error;
scoped_refptr<const Extension> extension;
if (info.extension_manifest) {
extension = Extension::Create(info.extension_path, info.extension_location,
*info.extension_manifest,
GetCreationFlags(&info), &error);
} else {
error = manifest_errors::kManifestUnreadable;
}
// Once installed, non-unpacked extensions cannot change their IDs (e.g., by
// updating the 'key' field in their manifest).
// TODO(jstritar): migrate preferences when unpacked extensions change IDs.
if (extension.get() && !Manifest::IsUnpackedLocation(extension->location()) &&
info.extension_id != extension->id()) {
error = manifest_errors::kCannotChangeExtensionID;
extension = nullptr;
}
if (!extension.get()) {
LoadErrorReporter::GetInstance()->ReportLoadError(
info.extension_path, error, extension_service_->profile(),
false); // Be quiet.
return;
}
const ManagementPolicy* policy = extensions::ExtensionSystem::Get(
extension_service_->profile())->management_policy();
if (extension_prefs_->IsExtensionDisabled(extension->id())) {
int disable_reasons = extension_prefs_->GetDisableReasons(extension->id());
// Update the extension prefs to reflect if the extension is no longer
// blocked due to admin policy.
if ((disable_reasons & disable_reason::DISABLE_BLOCKED_BY_POLICY) &&
!policy->MustRemainDisabled(extension.get(), nullptr, nullptr)) {
disable_reasons &= (~disable_reason::DISABLE_BLOCKED_BY_POLICY);
extension_prefs_->ReplaceDisableReasons(extension->id(), disable_reasons);
if (disable_reasons == disable_reason::DISABLE_NONE)
extension_prefs_->SetExtensionEnabled(extension->id());
}
if ((disable_reasons & disable_reason::DISABLE_CORRUPTED)) {
CorruptedExtensionReinstaller* corrupted_extension_reinstaller =
extension_service_->corrupted_extension_reinstaller();
if (policy->MustRemainEnabled(extension.get(), nullptr)) {
// This extension must have been disabled due to corruption on a
// previous run of chrome, and for some reason we weren't successful in
// auto-reinstalling it. So we want to notify the reinstaller that we'd
// still like to keep attempt to re-download and reinstall it whenever
// the ExtensionService checks for external updates.
LOG(ERROR) << "Expecting reinstall for extension id: "
<< extension->id()
<< " due to corruption detected in prior session.";
corrupted_extension_reinstaller->ExpectReinstallForCorruption(
extension->id(),
CorruptedExtensionReinstaller::PolicyReinstallReason::
CORRUPTION_DETECTED_IN_PRIOR_SESSION,
extension->location());
} else if (extension->from_webstore()) {
// Non-policy extensions are repaired on startup. Add any corrupted
// user-installed extensions to the reinstaller as well.
corrupted_extension_reinstaller->ExpectReinstallForCorruption(
extension->id(), absl::nullopt, extension->location());
}
}
} else {
// Extension is enabled. Check management policy to verify if it should
// remain so.
disable_reason::DisableReason disable_reason = disable_reason::DISABLE_NONE;
if (policy->MustRemainDisabled(extension.get(), &disable_reason, nullptr)) {
extension_prefs_->SetExtensionDisabled(extension->id(), disable_reason);
}
}
if (write_to_prefs)
extension_prefs_->UpdateManifest(extension.get());
extension_service_->AddExtension(extension.get());
}
void InstalledLoader::LoadAllExtensions() {
LoadAllExtensions(extension_service_->profile());
}
void InstalledLoader::LoadAllExtensions(Profile* profile) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
TRACE_EVENT0("browser,startup", "InstalledLoader::LoadAllExtensions");
bool is_user_profile =
profile_util::ProfileCanUseNonComponentExtensions(profile);
const base::TimeTicks load_start_time = base::TimeTicks::Now();
ExtensionPrefs::ExtensionsInfo extensions_info =
extension_prefs_->GetInstalledExtensionsInfo();
bool should_write_prefs = false;
for (auto& info : extensions_info) {
// Skip extensions that were loaded from the command-line because we don't
// want those to persist across browser restart.
if (info.extension_location == mojom::ManifestLocation::kCommandLine) {
continue;
}
if (ShouldReloadExtensionManifest(info) != NOT_NEEDED) {
// Reloading an extension reads files from disk. We do this on the
// UI thread because reloads should be very rare, and the complexity
// added by delaying the time when the extensions service knows about
// all extensions is significant. See crbug.com/37548 for details.
// |allow_blocking| disables tests that file operations run on the file
// thread.
base::ScopedAllowBlocking allow_blocking;
std::string error;
scoped_refptr<const Extension> extension(
file_util::LoadExtension(info.extension_path, info.extension_location,
GetCreationFlags(&info), &error));
if (!extension.get() || extension->id() != info.extension_id) {
invalid_extensions_.insert(info.extension_path);
LoadErrorReporter::GetInstance()->ReportLoadError(info.extension_path,
error, profile,
false); // Be quiet.
continue;
}
info.extension_manifest = std::make_unique<base::Value::Dict>(
extension->manifest()->value()->Clone());
should_write_prefs = true;
}
}
for (const auto& info : extensions_info) {
if (info.extension_location != mojom::ManifestLocation::kCommandLine) {
Load(info, should_write_prefs);
}
}
UMA_HISTOGRAM_COUNTS_100("Extensions.LoadAll",
extension_registry_->enabled_extensions().size());
UMA_HISTOGRAM_COUNTS_100("Extensions.Disabled",
extension_registry_->disabled_extensions().size());
if (is_user_profile) {
UMA_HISTOGRAM_COUNTS_100("Extensions.LoadAll2",
extension_registry_->enabled_extensions().size());
UMA_HISTOGRAM_COUNTS_100("Extensions.Disabled2",
extension_registry_->disabled_extensions().size());
}
RecordExtensionsMetrics(profile, is_user_profile);
const base::TimeDelta load_all_time =
base::TimeTicks::Now() - load_start_time;
UMA_HISTOGRAM_TIMES("Extensions.LoadAllTime2", load_all_time);
if (is_user_profile) {
UMA_HISTOGRAM_TIMES("Extensions.LoadAllTime2.User", load_all_time);
} else {
UMA_HISTOGRAM_TIMES("Extensions.LoadAllTime2.NonUser", load_all_time);
}
}
void InstalledLoader::RecordExtensionsMetricsForTesting() {
RecordExtensionsMetrics(/*profile=*/extension_service_->profile(),
/*log_user_profile_histograms=*/false);
}
void InstalledLoader::RecordExtensionsIncrementedMetricsForTesting(
Profile* profile) {
LoadAllExtensions(profile);
}
// TODO(crbug.com/1163038): Separate out Webstore/Offstore metrics.
void InstalledLoader::RecordExtensionsMetrics(
Profile* profile,
bool should_record_incremented_metrics) {
ExtensionManagement* extension_management =
ExtensionManagementFactory::GetForBrowserContext(profile);
int app_user_count = 0;
int app_external_count = 0;
int hosted_app_count = 0;
int legacy_packaged_app_count = 0;
int platform_app_count = 0;
int user_script_count = 0;
int extension_user_count = 0;
int extension_external_count = 0;
int theme_count = 0;
int page_action_count = 0;
int browser_action_count = 0;
int no_action_count = 0;
int disabled_for_permissions_count = 0;
int non_webstore_ntp_override_count = 0;
int ntp_override_count = 0;
int homepage_override_count = 0;
int search_engine_override_count = 0;
int startup_pages_override_count = 0;
int incognito_allowed_count = 0;
int incognito_not_allowed_count = 0;
int file_access_allowed_count = 0;
int file_access_not_allowed_count = 0;
int eventless_event_pages_count = 0;
int off_store_item_count = 0;
int web_request_blocking_count = 0;
int web_request_count = 0;
int enabled_not_allowlisted_count = 0;
int disabled_not_allowlisted_count = 0;
const ExtensionSet& extensions = extension_registry_->enabled_extensions();
for (ExtensionSet::const_iterator iter = extensions.begin();
iter != extensions.end();
++iter) {
const Extension* extension = iter->get();
mojom::ManifestLocation location = extension->location();
Manifest::Type type = extension->GetType();
// For the first few metrics, include all extensions and apps (component,
// unpacked, etc). It's good to know these locations, and it doesn't
// muck up any of the stats. Later, though, we want to omit component and
// unpacked, as they are less interesting.
if (extension->is_app() && should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.AppLocation2", location);
} else if (extension->is_extension()) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExtensionLocation", location);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExtensionLocation2", location);
}
}
if (!extension_management->UpdatesFromWebstore(*extension)) {
UMA_HISTOGRAM_ENUMERATION("Extensions.NonWebstoreLocation", location);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.NonWebstoreLocation2", location);
}
// Check for inconsistencies if the extension was supposedly installed
// from the webstore.
enum {
BAD_UPDATE_URL = 0,
// This value was a mistake. Turns out sideloaded extensions can
// have the from_webstore bit if they update from the webstore.
DEPRECATED_IS_EXTERNAL = 1,
};
if (extension->from_webstore()) {
UMA_HISTOGRAM_ENUMERATION(
"Extensions.FromWebstoreInconsistency", BAD_UPDATE_URL, 2);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.FromWebstoreInconsistency2",
BAD_UPDATE_URL, 2);
}
}
}
if (Manifest::IsExternalLocation(location)) {
// See loop below for DISABLED.
if (extension_management->UpdatesFromWebstore(*extension)) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState",
EXTERNAL_ITEM_WEBSTORE_ENABLED,
EXTERNAL_ITEM_MAX_ITEMS);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState2",
EXTERNAL_ITEM_WEBSTORE_ENABLED,
EXTERNAL_ITEM_MAX_ITEMS);
}
} else {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState",
EXTERNAL_ITEM_NONWEBSTORE_ENABLED,
EXTERNAL_ITEM_MAX_ITEMS);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState2",
EXTERNAL_ITEM_NONWEBSTORE_ENABLED,
EXTERNAL_ITEM_MAX_ITEMS);
}
}
}
if (extension->permissions_data()->HasAPIPermission(
mojom::APIPermissionID::kWebRequestBlocking)) {
web_request_blocking_count++;
}
if (extension->permissions_data()->HasAPIPermission(
mojom::APIPermissionID::kWebRequest)) {
web_request_count++;
}
// From now on, don't count component extensions, since they are only
// extensions as an implementation detail. Continue to count unpacked
// extensions for a few metrics.
if (Manifest::IsComponentLocation(location))
continue;
// Histogram for extensions overriding the new tab page should include
// unpacked extensions.
if (URLOverrides::GetChromeURLOverrides(extension).count("newtab")) {
++ntp_override_count;
if (!extension->from_webstore()) {
++non_webstore_ntp_override_count;
}
}
// Histogram for extensions with settings overrides.
const SettingsOverrides* settings = SettingsOverrides::Get(extension);
if (settings) {
if (settings->search_engine)
++search_engine_override_count;
if (!settings->startup_pages.empty())
++startup_pages_override_count;
if (settings->homepage)
++homepage_override_count;
}
// Don't count unpacked extensions anymore, either.
if (Manifest::IsUnpackedLocation(location))
continue;
UMA_HISTOGRAM_ENUMERATION("Extensions.ManifestVersion",
extension->manifest_version(),
10); // 10 is arbitrarily chosen.
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ManifestVersion2",
extension->manifest_version(), 10);
}
// We might have wanted to count legacy packaged apps here, too, since they
// are effectively extensions. Unfortunately, it's too late, as we don't
// want to mess up the existing stats.
if (type == Manifest::TYPE_EXTENSION) {
UMA_HISTOGRAM_ENUMERATION("Extensions.BackgroundPageType",
GetBackgroundPageType(extension),
NUM_BACKGROUND_PAGE_TYPES);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.BackgroundPageType2",
GetBackgroundPageType(extension),
NUM_BACKGROUND_PAGE_TYPES);
}
if (GetBackgroundPageType(extension) == EVENT_PAGE) {
// Count extension event pages with no registered events. Either the
// event page is badly designed, or there may be a bug where the event
// page failed to start after an update (crbug.com/469361).
if (!EventRouter::Get(extension_service_->profile())
->HasRegisteredEvents(extension->id())) {
++eventless_event_pages_count;
VLOG(1) << "Event page without registered event listeners: "
<< extension->id() << " " << extension->name();
}
}
}
// Using an enumeration shows us the total installed ratio across all users.
// Using the totals per user at each startup tells us the distribution of
// usage for each user (e.g. 40% of users have at least one app installed).
UMA_HISTOGRAM_ENUMERATION(
"Extensions.LoadType", type, Manifest::NUM_LOAD_TYPES);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.LoadType2", type,
Manifest::NUM_LOAD_TYPES);
}
switch (type) {
case Manifest::TYPE_THEME:
++theme_count;
break;
case Manifest::TYPE_USER_SCRIPT:
++user_script_count;
break;
case Manifest::TYPE_HOSTED_APP:
++hosted_app_count;
if (Manifest::IsExternalLocation(location)) {
++app_external_count;
} else {
++app_user_count;
}
break;
case Manifest::TYPE_LEGACY_PACKAGED_APP:
++legacy_packaged_app_count;
if (Manifest::IsExternalLocation(location)) {
++app_external_count;
} else {
++app_user_count;
}
break;
case Manifest::TYPE_PLATFORM_APP:
++platform_app_count;
if (Manifest::IsExternalLocation(location)) {
++app_external_count;
} else {
++app_user_count;
}
break;
case Manifest::TYPE_EXTENSION:
default:
if (Manifest::IsExternalLocation(location)) {
++extension_external_count;
} else {
++extension_user_count;
}
break;
}
// We check the manifest key (instead of the ExtensionActionManager) because
// we want to know how many extensions have a given type of action as part
// of their code, rather than as part of the extension action redesign
// (which gives each extension an action).
if (extension->manifest()->FindKey(manifest_keys::kPageAction))
++page_action_count;
else if (extension->manifest()->FindKey(manifest_keys::kBrowserAction))
++browser_action_count;
else
++no_action_count;
ExtensionService::RecordPermissionMessagesHistogram(
extension, "Load", should_record_incremented_metrics);
// For incognito and file access, skip anything that doesn't appear in
// settings. Also, policy-installed (and unpacked of course, checked above)
// extensions are boring.
if (ui_util::ShouldDisplayInExtensionSettings(*extension) &&
!Manifest::IsPolicyLocation(extension->location())) {
if (util::CanBeIncognitoEnabled(extension)) {
if (util::IsIncognitoEnabled(extension->id(), profile))
++incognito_allowed_count;
else
++incognito_not_allowed_count;
}
if (extension->wants_file_access()) {
if (util::AllowFileAccess(extension->id(), profile))
++file_access_allowed_count;
else
++file_access_not_allowed_count;
}
}
if (!extension_management->UpdatesFromWebstore(*extension))
++off_store_item_count;
PermissionsManager* permissions_manager = PermissionsManager::Get(profile);
// NOTE: CanAffectExtension() returns false in all cases when the
// RuntimeHostPermissions feature is disabled.
if (permissions_manager->CanAffectExtension(*extension)) {
bool extension_has_withheld_hosts =
permissions_manager->HasWithheldHostPermissions(*extension);
UMA_HISTOGRAM_BOOLEAN(
"Extensions.RuntimeHostPermissions.ExtensionHasWithheldHosts",
extension_has_withheld_hosts);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_BOOLEAN(
"Extensions.RuntimeHostPermissions.ExtensionHasWithheldHosts2",
extension_has_withheld_hosts);
}
if (extension_has_withheld_hosts) {
// Record the number of granted hosts if and only if the extension
// has withheld host permissions. This lets us equate "0" granted
// hosts to "on click only".
size_t num_granted_hosts = 0;
for (const auto& pattern : extension->permissions_data()
->active_permissions()
.effective_hosts()) {
// Ignore chrome:-scheme patterns (like chrome://favicon); these
// aren't withheld, and thus shouldn't be considered "granted".
if (pattern.scheme() != content::kChromeUIScheme)
++num_granted_hosts;
}
// TODO(devlin): This only takes into account the granted hosts that
// were also requested by the extension (because it looks at the active
// permissions). We could potentially also record the granted hosts that
// were explicitly not requested.
UMA_HISTOGRAM_COUNTS_100(
"Extensions.RuntimeHostPermissions.GrantedHostCount",
num_granted_hosts);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_COUNTS_100(
"Extensions.RuntimeHostPermissions.GrantedHostCount2",
num_granted_hosts);
}
}
}
LogHostPermissionsAccess(*extension, should_record_incremented_metrics);
if (extension_service_->allowlist()->GetExtensionAllowlistState(
extension->id()) == ALLOWLIST_NOT_ALLOWLISTED) {
// Record the number of not allowlisted enabled extensions.
++enabled_not_allowlisted_count;
}
}
const ExtensionSet& disabled_extensions =
extension_registry_->disabled_extensions();
for (ExtensionSet::const_iterator ex = disabled_extensions.begin();
ex != disabled_extensions.end();
++ex) {
if (extension_prefs_->DidExtensionEscalatePermissions((*ex)->id())) {
++disabled_for_permissions_count;
}
if (should_record_incremented_metrics) {
RecordDisableReasons(extension_prefs_->GetDisableReasons((*ex)->id()));
}
if (Manifest::IsExternalLocation((*ex)->location())) {
// See loop above for ENABLED.
if (extension_management->UpdatesFromWebstore(**ex)) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState",
EXTERNAL_ITEM_WEBSTORE_DISABLED,
EXTERNAL_ITEM_MAX_ITEMS);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState2",
EXTERNAL_ITEM_WEBSTORE_DISABLED,
EXTERNAL_ITEM_MAX_ITEMS);
}
} else {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState",
EXTERNAL_ITEM_NONWEBSTORE_DISABLED,
EXTERNAL_ITEM_MAX_ITEMS);
if (should_record_incremented_metrics) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState2",
EXTERNAL_ITEM_NONWEBSTORE_DISABLED,
EXTERNAL_ITEM_MAX_ITEMS);
}
}
}
if (extension_service_->allowlist()->GetExtensionAllowlistState(
(*ex)->id()) == ALLOWLIST_NOT_ALLOWLISTED) {
// Record the number of not allowlisted disabled extensions.
++disabled_not_allowlisted_count;
}
}
base::UmaHistogramCounts100("Extensions.LoadApp",
app_user_count + app_external_count);
base::UmaHistogramCounts100("Extensions.LoadAppUser", app_user_count);
base::UmaHistogramCounts100("Extensions.LoadAppExternal", app_external_count);
base::UmaHistogramCounts100("Extensions.LoadHostedApp", hosted_app_count);
base::UmaHistogramCounts100("Extensions.LoadPackagedApp",
legacy_packaged_app_count);
base::UmaHistogramCounts100("Extensions.LoadPlatformApp", platform_app_count);
base::UmaHistogramCounts100("Extensions.LoadExtension",
extension_user_count + extension_external_count);
base::UmaHistogramCounts100("Extensions.LoadExtensionUser",
extension_user_count);
base::UmaHistogramCounts100("Extensions.LoadExtensionExternal",
extension_external_count);
base::UmaHistogramCounts100("Extensions.LoadUserScript", user_script_count);
base::UmaHistogramCounts100("Extensions.LoadTheme", theme_count);
// Histogram name different for legacy reasons.
base::UmaHistogramCounts100("PageActionController.ExtensionsWithPageActions",
page_action_count);
base::UmaHistogramCounts100("Extensions.LoadBrowserAction",
browser_action_count);
base::UmaHistogramCounts100("Extensions.LoadNoExtensionAction",
no_action_count);
base::UmaHistogramCounts100("Extensions.DisabledForPermissions",
disabled_for_permissions_count);
base::UmaHistogramCounts100("Extensions.NonWebStoreNewTabPageOverrides",
non_webstore_ntp_override_count);
base::UmaHistogramCounts100("Extensions.NewTabPageOverrides",
ntp_override_count);
base::UmaHistogramCounts100("Extensions.SearchEngineOverrides",
search_engine_override_count);
base::UmaHistogramCounts100("Extensions.StartupPagesOverrides",
startup_pages_override_count);
base::UmaHistogramCounts100("Extensions.HomepageOverrides",
homepage_override_count);
if (should_record_incremented_metrics) {
base::UmaHistogramCounts100("Extensions.LoadApp2",
app_user_count + app_external_count);
base::UmaHistogramCounts100("Extensions.LoadAppUser2", app_user_count);
base::UmaHistogramCounts100("Extensions.LoadAppExternal2",
app_external_count);
base::UmaHistogramCounts100("Extensions.LoadHostedApp2", hosted_app_count);
base::UmaHistogramCounts100("Extensions.LoadPackagedApp2",
legacy_packaged_app_count);
base::UmaHistogramCounts100("Extensions.LoadPlatformApp2",
platform_app_count);
base::UmaHistogramCounts100(
"Extensions.LoadExtension2",
extension_user_count + extension_external_count);
base::UmaHistogramCounts100("Extensions.LoadExtensionUser2",
extension_user_count);
base::UmaHistogramCounts100("Extensions.LoadExtensionExternal2",
extension_external_count);
base::UmaHistogramCounts100("Extensions.LoadUserScript2",
user_script_count);
base::UmaHistogramCounts100("Extensions.LoadTheme2", theme_count);
base::UmaHistogramCounts100("Extensions.ExtensionsWithPageActions",
page_action_count);
base::UmaHistogramCounts100("Extensions.LoadBrowserAction2",
browser_action_count);
base::UmaHistogramCounts100("Extensions.LoadNoExtensionAction2",
no_action_count);
base::UmaHistogramCounts100("Extensions.DisabledForPermissions2",
disabled_for_permissions_count);
base::UmaHistogramCounts100("Extensions.NonWebStoreNewTabPageOverrides2",
non_webstore_ntp_override_count);
base::UmaHistogramCounts100("Extensions.NewTabPageOverrides2",
ntp_override_count);
base::UmaHistogramCounts100("Extensions.SearchEngineOverrides2",
search_engine_override_count);
base::UmaHistogramCounts100("Extensions.StartupPagesOverrides2",
startup_pages_override_count);
base::UmaHistogramCounts100("Extensions.HomepageOverrides2",
homepage_override_count);
}
if (incognito_allowed_count + incognito_not_allowed_count > 0) {
base::UmaHistogramCounts100("Extensions.IncognitoAllowed",
incognito_allowed_count);
base::UmaHistogramCounts100("Extensions.IncognitoNotAllowed",
incognito_not_allowed_count);
if (should_record_incremented_metrics) {
base::UmaHistogramCounts100("Extensions.IncognitoAllowed2",
incognito_allowed_count);
base::UmaHistogramCounts100("Extensions.IncognitoNotAllowed2",
incognito_not_allowed_count);
}
}
if (file_access_allowed_count + file_access_not_allowed_count > 0) {
base::UmaHistogramCounts100("Extensions.FileAccessAllowed",
file_access_allowed_count);
base::UmaHistogramCounts100("Extensions.FileAccessNotAllowed",
file_access_not_allowed_count);
if (should_record_incremented_metrics) {
base::UmaHistogramCounts100("Extensions.FileAccessAllowed2",
file_access_allowed_count);
base::UmaHistogramCounts100("Extensions.FileAccessNotAllowed2",
file_access_not_allowed_count);
}
}
base::UmaHistogramCounts100(
"Extensions.CorruptExtensionTotalDisables",
extension_prefs_->GetPrefAsInteger(kCorruptedDisableCount));
base::UmaHistogramCounts100("Extensions.LoadOffStoreItems",
off_store_item_count);
base::UmaHistogramCounts100("Extensions.WebRequestBlockingCount",
web_request_blocking_count);
base::UmaHistogramCounts100("Extensions.WebRequestCount", web_request_count);
base::UmaHistogramCounts100("Extensions.NotAllowlistedEnabled",
enabled_not_allowlisted_count);
base::UmaHistogramCounts100("Extensions.NotAllowlistedDisabled",
disabled_not_allowlisted_count);
if (should_record_incremented_metrics) {
base::UmaHistogramCounts100(
"Extensions.CorruptExtensionTotalDisables2",
extension_prefs_->GetPrefAsInteger(kCorruptedDisableCount));
base::UmaHistogramCounts100("Extensions.EventlessEventPages2",
eventless_event_pages_count);
base::UmaHistogramCounts100("Extensions.LoadOffStoreItems2",
off_store_item_count);
base::UmaHistogramCounts100("Extensions.WebRequestBlockingCount2",
web_request_blocking_count);
base::UmaHistogramCounts100("Extensions.WebRequestCount2",
web_request_count);
base::UmaHistogramCounts100("Extensions.NotAllowlistedEnabled2",
enabled_not_allowlisted_count);
base::UmaHistogramCounts100("Extensions.NotAllowlistedDisabled2",
disabled_not_allowlisted_count);
}
if (safe_browsing::IsEnhancedProtectionEnabled(*profile->GetPrefs())) {
base::UmaHistogramCounts100("Extensions.NotAllowlistedEnabledAndEsbUser",
enabled_not_allowlisted_count);
base::UmaHistogramCounts100("Extensions.NotAllowlistedDisabledAndEsbUser",
disabled_not_allowlisted_count);
if (should_record_incremented_metrics) {
base::UmaHistogramCounts100("Extensions.NotAllowlistedEnabledAndEsbUser2",
enabled_not_allowlisted_count);
base::UmaHistogramCounts100(
"Extensions.NotAllowlistedDisabledAndEsbUser2",
disabled_not_allowlisted_count);
}
}
}
int InstalledLoader::GetCreationFlags(const ExtensionInfo* info) {
int flags = extension_prefs_->GetCreationFlags(info->extension_id);
if (!Manifest::IsUnpackedLocation(info->extension_location)) {
flags |= Extension::REQUIRE_KEY;
}
// Use the AllowFileAccess pref as the source of truth for file access,
// rather than any previously stored creation flag.
flags &= ~Extension::ALLOW_FILE_ACCESS;
if (extension_prefs_->AllowFileAccess(info->extension_id)) {
flags |= Extension::ALLOW_FILE_ACCESS;
}
return flags;
}
} // namespace extensions